Basic Concepts of I.T.: Course Description
Basic Concepts of I.T.: Course Description
Course Description.
Objectives.
You will learn many aspects of IT including:
Pre-requisites.
• Information Society
We live in an “Information Society” where the effective use of information
is regarded as the defining element of the 20th – 21st centuries. Therefore in
this book we will focus more on how we use computers to manage
information processing.
1.1 What is a Computer?
- These are the parts you can touch (although many parts are contained
within the computer’s case).
• Software:
- The instructions that a computer follows (from computer programs /
applications ).
Software is made up of a series of instructions that tell the computer what
to do. Software is sometimes called “computer programs”. Therefore
software can be defined as sets of instructions that govern data processing
in computers.
- Operating systems, office programs and games are examples of
software.
- Software governs when and how various pieces of hardware can be put
to a variety of uses.
1.2 Types of computer.
There are many types of computer that are used for a variety of different
needs.
• Mainframe
• Minicomputer
A minicomputer is a smaller, less powerful version of a mainframe. A
minicomputer is often cheaper due to its lower processing power and
storage capacity (as compared to a mainframe). However, a minicomputer
is not able to serve as many users at once.
Usually, only one user accesses a PC at any one time. The user sits in front
of the PC and works directly with it, rather than connecting to it using
another computer.
A PC requires far less processing power and storage than some types of
computer and this helps to make the PC much cheaper.
All PC’s have a similar design and are produced by a large number of
manufacturers with different specifications. PC’s can however, vary
widely in terms of performance and the sort of tasks they are suitable for
(depending on the underlying hardware and software on the PC).
PC’s often run Microsoft Windows operating systems. There are however,
other types of personal computers such as the Apple Macintosh that use a
different version of software to a “PC”.
The main reason why the PC has become so popular for home and office
uses is that
it is a versatile tool that can be used for a wide range of applications.
• Network Computer (NC)
A Net work Computer (NC) is a low-cost version of the PC. NC’s are
designed to connect to and be managed by a central computer (i.e., a
mainframe or minicomputer). Every time the Network Computer is
switched on (booted), it retrieves the latest version of the software it needs
from the central computer.
Therefore, components used to install and upgrade software (disk drive,
CD-Rom etc) are not required.
Keyboard (Input)
Mous
e (Input)
Memory
(working
memory)
Disk Drives
CPU (permanent
memory)
Ports
(Printer, Mouse,
Keyboard,Monitor)
Graphics Motherboard
Card. Expansion slots.
CPU: The CPU, or Central Processing Unit, is the brains of the computer.
All the "thinking", calculating and processing is done by the CPU. The
CPU is an advanced microprocessor that performs calculations and
determines what to do with the results.
The CPU is sent instructions by the computer’s software and can process
many millions of
instructions per
second. The results
are passed to other
components. The
speed at which the
CPU operates can be
the main factor
influencing the overall system performance. The CPU’s activities are co-
ordinated by a clock that is used to synchronize all internal processes.
Each unit of time is called a cycle and speeds are generally measured in
megahertz (MHz) or gigahertz (GHz).
1 megahertz =1 million cycles per second.
The CPU also incorporates an Arithmetic Logic Unit (which performs the
calculations and logical operations within the computer) and a Control
Unit (which fetches, decodes and executes data from the memory).
Light pen: A special pen that lets you draw directly onto the screen, or
click on buttons and menus.
Graphics Pad: This is a square piece of material that you can use to draw
pictures (as a mouse is not always practical for drawing complicated lines
and shapes).
With modern software, the screen display can be the most important
interface with the user. Nearly all commands are issued using a keyboard
and/or mouse (including a tracker ball/touchpad etc).
Displaying data on-screen requires a graphics card (such as an AGP
supported card described earlier) and a Visual Display Unit (VDU).
AGP Card
VDU (also known as a Monitor): The screen/monitor/visual display unit
is the part of the computer that displays the current process or application
(i.e., what’s going on and what you are doing).
There are several types of VDU such as the CRT (Cathode Ray Tube)
and Flat Screen/LCD style. CRT’s are cheaper but take up more
desktop space whereas Flat Screen/LCD styles take up less room, often
display a much sharper screen but are generally much more expensive.
CRT
Flat
Screen
Monitors often vary in size from 14” to 21” (30 – 60 cm). A larger screen
can display images at a higher resolution. The Horizontal Resolution screen
image is made up of pixels (a ‘dot’ or ‘point’ on the screen display). The
screen resolution is defined by the maximum number of pixels displayed
horizontally and vertically. Most monitors can support a number of screen
resolutions such as 640 x 480, 800 x 600, 1024 x 768, 1280 x 1024 etc
where the size n x n denotes the number of pixels in width x height
respectively. The higher the screen resolution, the more graphical
information you will be able to fit on the screen (and objects will look
smaller and sharper). Very high resolutions (1024 x 768 and above) are
often used for CAD (Computer Aided Design) tasks to ensure an accurate
representation of drawing objects.
A monitor should also have a sufficient refresh rate at the selected
resolutions. The refresh rate is the frequency with which an image is
redrawn. If the refresh rate is set too low, the image will appear to flicker
and may cause eye strain and headaches.
Printers are used to transfer information from the computer onto paper. For
example, if you typed a letter in a word processor, you could print out a
paper copy to send. There are many different types of printers (presented
below).
Laser: These are large, expensive printers that work like a photocopier.
They usually have very high quality printouts and can print very fast.
Inkjet and Bubble-Jet: These are smaller, cheaper printers that use a little
cartridge to spray a jet of ink onto the paper. They are fairly quiet and of
good quality, but are not as fast or produce such high quality output as a
laser printer. These printers are sometimes known as line printers because
they print each page one line at
a time.
Dot matrix/impact: An older type of printer that uses a ribbon and a print
head, like a typewriter. They are very loud and extremely slow. However,
they are very much cheaper.
Examples
of file sizes.
Often you will also see hardware and software described as supporting a
certain number of bits. These numbers refer to how much information the
hardware or software can process at any one time. For example, newer 64-
bit processors can process 64 bits of data in each clock cycle.
• Memory
Volatile: This type of memory loses all its data when the PC is turned off.
RAM is volatile memory.
Non-volatile: This type of memory keeps the data it contains even when
the PC is switched off.
Main memory (or system memory): Main memory is the largest amount
of RAM installed on the motherboard of a PC. It is used to run software
applications and temporarily store data that is entered by the user. Every
piece of software needs a certain amount of main memory to operate
efficiently.
Cache: Cache is a very fast type of RAM directly attached to particular
components such as the CPU, hard disk or graphics card. Cache enables an
amount of data to be copied from the main memory so the component can
access it more quickly. Cache balances the ability of relatively slow
components (disk drives) to keep fast components (CPU) supplied with a
constant stream of data.
• Disk Storage Devices
Disk drives are used to store and transfer data files. After data is entered
into a computer, is must be saved as a file to preserve its contents after the
computer is switched off.
A software application must also install files onto the main disk drive in
order to run when the user requests its use.
Hard disk: Usually fixed inside the computer and stores large volumes of
data, which can be accessed and retrieved quickly. The seek time of a hard
disk is much lower and the transfer rate much higher than any other type of
disk drive. The drive consists of a number of rigid magnetic disks in a
protective casing. Data is recorded magnetically onto concentric circular
tracks that are divided into a number of sectors.
An arm moves over the surface of the disk to read the data. At the time of
writing this document, hard disk sizes range from 40GB to 180GB for a
standard desktop PC.
Floppy disk drive: A floppy disk drive is like a hard disk, but with
removable disks called floppies, floppy disks or diskettes.
Floppies can be used to transfer small files from one PC to another (up to
1.4MB). Older floppies really were floppy, as they came in soft plastic or
card cases. Today's floppies are a bit more sturdy, although the disk itself is
very floppy and wobbly (which is why it is housed in a strong
plastic case).
Floppy disks are used when you need to transfer a small file from one PC
to another. Some drives support 120MB floppy disks (super disks) but
these drives are more expensive and the diskettes cannot be read in a
standard floppy drive.
ZIP/JAZ drives are another type of floppy drive that uses special disks
instead of floppy disks. Zip disks can hold about 100 times as much as a
floppy disk. JAZ disks can hold
much more data. Currently, ZIP
and JAZ disks range from
100MB diskettes to around
2GB’s.
CD-R, CD-RW, DVD-R and DVD-RW drives allow you to write (often
referred to as (burn) your own CD’s or DVD’s. Both CD-R and DVD-R
disks are Read-Only after burning and can be read in almost any CD and
DVD drive. CD-RW and DVD-RW disks allow you to delete and
overwrite (Re- W rite) data and re-use the disks (however, RW disks are
more expensive).
• Multimedia
Sound card: A special controller inside the PC that translates sound into a
form the computer can understand.
Speakers: So that you can hear the sounds and music playing.
Digital camera: This works like a normal camera, but doesn't use film -
instead it lets you transfer the pictures directly into your PC.
Software refers to the programs that are loaded onto a computer. Microsoft
Word, Excel, Access, PowerPoint, Internet Explorer etc are all software
programs.
Systems software is the software that runs the computer - this is usually
called the operating system. Microsoft Windows is the operating system a
lot of people use. However, there are other forms of systems software such
as UNIX, Linux, OS2, BeOS, OS-X (MacOS) and so on. As outlined in the
diagram below, users enter data into an application package. The
application provides an interface to a number of functions / operations.
The operating system received messages from applications and instructs
the hardware system to process and/or calculate data. The results are
passed back up the chain of events to the user.
Data
Applications
Operating
System
Hardware
Communication: Allows you to send and receive faxes and email and to
also browse the Internet. Examples of email programs include Microsoft
Outlook, Microsoft Outlook Express and Lotus Notes. Examples of
Internet browsers include Microsoft Internet Explorer and Netscape
Navigator.
• Software Development
Requirements
Software Design
System Testing
Operation and
Maintenance
(Stage 1) Requirements Analysis
This is the first stage, and involves a group of people called systems
analysts analyzing the requirements of the software and figuring out what
functions are needed to help solve the problem. The analysts produce a
feasibility report that defines the requirements of the new system and
recommends whether or not they can be met. Alternatives may also be
suggested such as a reduced system to match the costs and needs of the
project.
• Software Bugs.
Software programs are often so large and complex, most of the time the
people testing them can't find all the errors and problems. After a program
has been out for a while, users notice that there are little things wrong with
the software here and there - these things are called bugs. When the
number of bugs found in software increase, a patch, or service pack is
often released. This is a little add-on program that fixes most of the bugs
that people have found.
4.0 Networks
Workstation
(Client)
Shared
DeskJet printer.
LANs are connected by a system of cables that allows the computers talk
to each other. The computers must also have network cards installed in
order to get them to connect to the network.
The server will generally run a network operating system and provide
services such as shared data stores, access to software, communication
services (email boxes etc) and internet access.
Different network drives may also appear on the list of drives available
when a user logs-into the network (via a username and password).
4.1 Telecommunications
Telecommunication networks are often used to transmit data between
computers and networks.
Standard telephone
modem card.
Broadband Cable
Modem.
Fax: A fax works in a similar way to a modem - in fact, it's like a scanner
or photocopier combined with a modem. You put a piece of paper in it, the
fax scans the words or pictures on the paper, and sends it down the
telephone line. A fax at the other end receives the information, and prints
out an exact copy of the original.
Telex: The telex was an ancient piece of 1970’s technology. You would
type in what you wanted to say on your telex machine (like an electronic
typewriter), it would send that down the telephone line, and the telex
machine at the other end would type out what you originally typed. Telexes
are no longer in popular use.
Sometimes the phrases The Internet and the World Wide Web are used
interchangeably. However, to be strictly correct, the Internet refers to all
the computers and cables that make up the network and the World Wide
Web refers to the pages of information that are stored on those computers.
The Internet is also sometimes referred to as The Information
Superhighway.
• Websites
The information on the Internet is stored in web pages and websites. A
web page is like a normal page of text and pictures, but in a special file
format that any computer can read. A program called a browser is used to
read these pages. The two main types of browser are Microsoft Internet
Explorer and Netscape Navigator.
To create web pages you can use a web-editing package such as Microsoft
FrontPage or Macromedia Dreamweaver. You can also create web
pages using HTML (Hyper Text Markup Language). Web pages can also
link to other sites and document. These links are called hyperlinks that
you can click on with your mouse. Web pages are accessed with the use of
a URL (Uniform Recourse Locator) such as http://www.lon.ac.uk or
http://www.microsoft.com.
• Search Engines
There are millions of web pages on the Internet. To browse for
information, you can use a search engine to quickly find what you're
looking for. To use a search engine, you type in a word or phrase and the
search engine quickly looks though all the web pages for those that match
the search criteria you specify. The search engine then displays a list of
likely websites that you can look through to see if they contain the relevant
information. Some examples of search engines are www.google.co.uk,
www.yahoo.co.uk, www.msn.co.uk, www.ask.co.uk and so on.
• E-commerce
Email can be sent over the Internet to anyone in the world (as long as they
have access to the Internet and email software). Email is much quicker than
the traditional postal system.
When you want to send an email, you simply type a letter into your email
software application and send it to an email address. The software sends
the message via your Internet connection to your ISP (Internet Service
Provider). Your ISP then forwards the message to the recipient’s ISP email
server. The next time the recipient "logs on" to the Internet and checks their
email, your message will arrive in their ‘inbox’ to be read.
Computers are in common use today as they can be used to process large
amounts of data in a short amount of time. Many areas of modern society
take advantage of the power of computing.
• Computers in Business
Offices: Companies can use computers to store their records, keep track of
their customers, or even help to run the business. Computers are used to
pay employees, send out letters to customers, and communicate with other
companies and/or departments.
• Education
It is very important to have some computer skills in today's working world.
As well as storing student details, names, addresses, academic records and
so on, most schools now have some form of computer education. Pupils
can learn about the computer world and also make use of the ability to
connect up to other learning institutions.
Pupils can also write reports using the computers and also use CBT
(Computer Based Training) materials to study science, Math, languages
etc. Often pupils make use of Encyclopedias (from CD/DVD) to search
and find useful information.
Robotics: Industries use robotics to carry out tasks that would be difficult
or dangerous for a human to undertake. Most robots have programmed
arms to manipulate items (such as when manufacturing a car etc). These
devices are controlled by computer systems and instructions.
• Healthcare
Computers are used to record patient records, control diagnostic
instruments and equipment, control ambulance scheduling/tracking,
conduct medical research and provide online services.
Computers are not useful for: making decisions that require human
judgment, dealing with unexpected circumstances, original
thought/intuition/imagination or dealing with emotional responses
(complaints etc).
Select Open Antivirus… and click the button. If your machine is left
switched on, the Antivirus software may automatically update itself and
scan important system files at regular intervals.
• Virus Hoaxes
With a Virus Hoax, you may receive an email telling you about a scary
new virus that has just come out. Often the message will state that this
information has been reported by Microsoft/IBM/AOL etc. The message
may also state that the ‘new virus’ is even worse that the last virus that
came out and has no cure. The message then tells you to forward the
message on to all of your friends. Later on, you often find out the whole
thing was made up and designed to cause chaos wherever it can.
These hoaxes are designed to create a panic, and get everyone sending the
same message to all of their friends, who then send it to all of their friends,
and so on. It ties up your company mail with hundreds of emails going
around, and wastes everyone's time.
If you receive an email like this, do not send it to all of your friends - if you
do, the hoaxer has won. Check with an online virus library, and find out if
it is a hoax.
Norton / Symmantic
http://www.norton.com
6.1 Copyright.
The same copyright laws that apply to newspapers, books, television and
film apply to data on computers or the Internet. If someone has created
something and puts it on their website, you may not have the right to
include it in your own publications or distribute the material without the
consent of the author or creator. With regards to a computer program
(software), you are not allowed to change the code - even if it is an
improvement. Software is also copyright protected to the author/creator.
Licensing: Software is licensed instead of sold. This means that you are
paying to use the software and must agree to certain conditions. Often
these conditions (called the license agreement) are displayed when you first
install a piece of software, and you usually have to click an “agree” button
to continue the installation.
However, if a company had 100 computers and needed Microsoft Office
on all of them, it would be expensive to purchase 100 copies of the same
software. It would also be illegal to purchase one copy and install it on all
100 computers. This is where licensing comes into play. There are various
types of multi-user license depending on whether you want it to cover one
building, several branches or a certain number of users at one time. A
company can have only one copy of the software but have paid for a
license to install and use it on a number of machines.
- Shareware: The program is given out free for you to try for a trial
period only. If you want to continue using the software after the trial period
(say a month), then you have to pay for it. If not, you must delete it (or the
software may often disable certain features). When software stops working
after the trial period, you are given the code to unlock it once you have paid
(or the supplier may send a complete version).
Many businesses use computers to keep records. There are therefore a lot
of computers that have your name, address, and other details stored on
them. For instance, when you apply for credit, companies check with your
bank or a credit agency to look up your credit records.
Some companies sell their lists of names and addresses to marketing
companies, whereby you may receive lots of junk mail (leaflets offering
credit cards, loans etc). The same applies for email addresses and leads to
junk email (called SPAM – a term used from a famous Monty Python
sketch where everything on the menu has got
SPAM in it).
The maintenance and protection of personal information is a serious
responsibility. Incorrect or misleading information could, for instance,
lead to a person being refused a loan, mortgage, job, insurance etc.
Therefore, holding personal information demands sensitivity and respect
and is reflected in the data protection laws.
The Data Protection Act 1998 is intended to safeguard the information
about you. Anyone who holds personal details about an individual on
computer must register with the Data Protection Registrar, giving details of
the information they hold, what it is used for etc.
Companies who store your personal details are not allowed to use them for
illegal purposes or even for a different purpose from that stated. They
cannot cross-reference the data with the information that other
organizations contain. The records must be kept secure, out of the wrong
hands, kept up to date and disposed of when no longer needed.
If a company stores your details on computer, you are allowed to write to
them requesting a copy of all the information about you. They must
respond within 40 days so even if they cannot give you the details
immediately they have to write back and tell you. You also have the right
to correct the information if the details are incorrect or get rid of it
completely.
• RSI
RSI stands for Repetitive Strain Injury. If you are typing and/or using the
mouse a lot, you can strain the muscles in your hand, arm, and back. Take a
short break (say 10 minutes or so) in ever hour whilst using a computer so
that your muscles have time to relax a little. Do not go longer than an hour
without a break. Try to arrange your day so that you break up your
computer time by doing tasks away from the screen.
• Eyes
Your eyes can get strained if you have been working on a computer for a
long time without taking a break. Look away from the screen whenever
you can and focus on objects further away (on the other side of the room or
out of the window). Also, remember to blink (may sound silly, but when
you are stare at a screen for a long time you actually blink a lot less).
You should also have adjustable controls on your screen so you can adjust
the brightness contrast etc. Position your computer screen so that any
windows that allow in natural daylight are to the side of you (not behind or
in front). If you see a window’s reflection when you look at your screen,
use a window blind or shade to reduce its brightness. You can also attach
an anti-glare filter in front of your computer screen (these filters can reduce
glare by 95-99%).
• General issues
Don't leave the PC in a place where it will get very hot or very cold.
If you work in a shared environment (where many users may use a
machine), remember to log out of your computer when you are not using it
or if you are away from your computer for a longer period of time (for
instance, lunch break). To log out of a Windows session, click the
button, select Shutdown and choose Log off from the shutdown window.
When you have finished using your computer and wish to shut it down
completely, click the button, select Shutdown and choose the
Shut down option from the window. Remember to shut the computer
down properly and wait until it powers off completely (or it may display a
message when it is safe to switch it off).
Don't pull the plug out or switch it off while it's still doing something!
The RAM empties when the computer is off, and you will lose your work
(for example, windows may be in the process of saving your document).
Switching it off without shutting it down can damage the hard disk and
cause start-up problems.
If you are aware of any planned electrical maintenance in an
office/building (overnight or over a weekend/holiday period), ensure that
you shut down and power-off your computer. When an electricity supply
is turned on, power spikes may cause some damage to sensitive computer
devices that may be left switched on.
Try to keep dust away from your computer as can build-up inside.
Keep the area around your computer reasonably tidy and avoid piling-up
many documents on top of your screen and computer as this can block
ventilation and cause overheating.
Don't move the PC base unit while it
is switched on. The hard disk is very
delicate, and moving it can cause the
read/write arms to come into contact with the disk surface
(which can badly damage it).
Keep floppy disks away from the screen, speakers, and magnets - any data
on them can be erased. Also, keep magnets away from the base unit.
When considering the environment, use the power options on your
computer to eliminate any unnecessary power consumption. Only use a
computer that is Energy Star® compliant.